IL253178B - ניתור תעבורה ברשת מחשבים - Google Patents

ניתור תעבורה ברשת מחשבים

Info

Publication number
IL253178B
IL253178B IL253178A IL25317817A IL253178B IL 253178 B IL253178 B IL 253178B IL 253178 A IL253178 A IL 253178A IL 25317817 A IL25317817 A IL 25317817A IL 253178 B IL253178 B IL 253178B
Authority
IL
Israel
Prior art keywords
computer network
monitoring traffic
traffic
monitoring
network
Prior art date
Application number
IL253178A
Other languages
English (en)
Other versions
IL253178A0 (he
Inventor
Haelion Erez Kaplan
Original Assignee
Cyber 2 0 2015 Ltd
Haelion Erez Kaplan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cyber 2 0 2015 Ltd, Haelion Erez Kaplan filed Critical Cyber 2 0 2015 Ltd
Publication of IL253178A0 publication Critical patent/IL253178A0/he
Publication of IL253178B publication Critical patent/IL253178B/he

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
IL253178A 2015-12-31 2017-06-26 ניתור תעבורה ברשת מחשבים IL253178B (he)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562273530P 2015-12-31 2015-12-31
PCT/IL2016/051381 WO2017115356A1 (en) 2015-12-31 2016-12-26 Monitoring traffic in a computer network ‎

Publications (2)

Publication Number Publication Date
IL253178A0 IL253178A0 (he) 2017-07-31
IL253178B true IL253178B (he) 2019-01-31

Family

ID=59224776

Family Applications (1)

Application Number Title Priority Date Filing Date
IL253178A IL253178B (he) 2015-12-31 2017-06-26 ניתור תעבורה ברשת מחשבים

Country Status (10)

Country Link
US (3) US9794277B2 (he)
EP (1) EP3398291A4 (he)
JP (1) JP2019507412A (he)
KR (1) KR20180099683A (he)
CN (1) CN108476138A (he)
AU (1) AU2016381499A1 (he)
CA (1) CA3006418A1 (he)
IL (1) IL253178B (he)
SG (1) SG11201804315TA (he)
WO (1) WO2017115356A1 (he)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190089595A1 (en) * 2017-09-18 2019-03-21 Cyber 2.0 (2015) LTD Automatic security configuration
US20200028856A1 (en) * 2018-07-23 2020-01-23 Cyber 2.0 (2015) LTD Port scrambling usage in heterogeneous networks
US11356445B2 (en) 2017-03-28 2022-06-07 Amazon Technologies, Inc. Data access interface for clustered devices
US10530752B2 (en) * 2017-03-28 2020-01-07 Amazon Technologies, Inc. Efficient device provision
US10621055B2 (en) 2017-03-28 2020-04-14 Amazon Technologies, Inc. Adaptive data recovery for clustered data devices
CN108683652A (zh) * 2018-05-04 2018-10-19 北京奇安信科技有限公司 一种基于行为权限的处理网络攻击行为的方法及装置
US11201897B1 (en) 2019-09-03 2021-12-14 Rapid7, Inc. Secure multiplexed routing
US11297036B1 (en) * 2019-09-03 2022-04-05 Rapid7, Inc. Single whitelisted ingress endpoint on 1 and 2 way TLS connections
CN113364821B (zh) * 2020-03-04 2024-03-05 腾讯科技(深圳)有限公司 一种功能服务访问方法、设备及存储介质
CN111565180B (zh) * 2020-04-28 2021-01-29 广州锦行网络科技有限公司 一种虚拟端口的保护系统及方法
US20220060498A1 (en) * 2020-08-20 2022-02-24 Intrusion, Inc. System and method for monitoring and securing communications networks and associated devices
CN113923190B (zh) * 2021-09-15 2023-11-28 北京达佳互联信息技术有限公司 设备标识跳变的识别方法及装置、服务器及存储介质

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5903721A (en) 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US6549538B1 (en) 1998-12-31 2003-04-15 Compaq Information Technologies Group, L.P. Computer method and apparatus for managing network ports cluster-wide using a lookaside list
FR2823936B1 (fr) * 2001-04-19 2003-05-30 France Telecom Procede et systeme d'acces conditionnel a des services ip
US7644436B2 (en) * 2002-01-24 2010-01-05 Arxceo Corporation Intelligent firewall
US7092943B2 (en) * 2002-03-01 2006-08-15 Enterasys Networks, Inc. Location based data
JP2004112018A (ja) 2002-09-13 2004-04-08 Johnson Controls Inc インターネットアクセスWeb監視制御システム
US7386889B2 (en) * 2002-11-18 2008-06-10 Trusted Network Technologies, Inc. System and method for intrusion prevention in a communications network
US20050132060A1 (en) * 2003-12-15 2005-06-16 Richard Mo Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks
US20050220017A1 (en) 2004-03-31 2005-10-06 Brand Thomas E Denial of service protection through port hopping
US20060005227A1 (en) 2004-07-01 2006-01-05 Microsoft Corporation Languages for expressing security policies
US20070070996A1 (en) * 2005-09-26 2007-03-29 Oran David R Port hopping scheme for peer-to-peer connections
US7721091B2 (en) * 2006-05-12 2010-05-18 International Business Machines Corporation Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages
WO2009055717A1 (en) 2007-10-24 2009-04-30 Jonathan Peter Deutsch Various methods and apparatuses for a central station to allocate virtual ip addresses
US7903566B2 (en) * 2008-08-20 2011-03-08 The Boeing Company Methods and systems for anomaly detection using internet protocol (IP) traffic conversation data
US8572717B2 (en) * 2008-10-09 2013-10-29 Juniper Networks, Inc. Dynamic access control policy with port restrictions for a network security appliance
US8578491B2 (en) * 2008-12-11 2013-11-05 Alcatel Lucent Network based malware detection and reporting
US8549625B2 (en) * 2008-12-12 2013-10-01 International Business Machines Corporation Classification of unwanted or malicious software through the identification of encrypted data communication
US8208418B1 (en) * 2009-01-16 2012-06-26 Extreme Networks, Inc. Methods, systems, and computer readable media for conserving multicast port list resources in an internet protocol (IP) packet forwarding device
US20110026529A1 (en) * 2009-07-31 2011-02-03 Saugat Majumdar Method And Apparatus For Option-based Marking Of A DHCP Packet
JP5357707B2 (ja) 2009-11-11 2013-12-04 株式会社日立製作所 ゲートウェイ装置およびポート番号割当て方法
US8958292B2 (en) 2010-07-06 2015-02-17 Nicira, Inc. Network control apparatus and method with port security controls
US9124598B2 (en) * 2011-06-27 2015-09-01 Kaseya Limited Method and apparatus of establishing a connection between devices using cached connection information
CN102868943B (zh) * 2011-07-04 2015-11-25 华为技术有限公司 一种获取pon端口关联关系的方法、光网络装置和系统
US9813310B1 (en) * 2011-10-31 2017-11-07 Reality Analytics, Inc. System and method for discriminating nature of communication traffic transmitted through network based on envelope characteristics
US9100497B2 (en) * 2012-04-05 2015-08-04 Blackberry Limited Method, system and apparatus for managing persona-based notifications at a communication device
US8751650B2 (en) 2012-05-10 2014-06-10 Cisco Technology, Inc. Method and apparatus for supporting access control lists in a multi-tenant environment
US20140281546A1 (en) * 2013-03-13 2014-09-18 Eolas Technologies, Inc. HEDI-Hopping-Enabled Dynamically-secured Intercommunication (AKA SockHop)
US9992215B2 (en) * 2013-10-04 2018-06-05 Webroot Inc. Network intrusion detection

Also Published As

Publication number Publication date
CA3006418A1 (en) 2017-07-06
US20180007072A1 (en) 2018-01-04
US9794277B2 (en) 2017-10-17
EP3398291A4 (en) 2019-06-26
US10333956B2 (en) 2019-06-25
EP3398291A1 (en) 2018-11-07
US9985981B2 (en) 2018-05-29
AU2016381499A1 (en) 2018-08-09
US20180270257A1 (en) 2018-09-20
SG11201804315TA (en) 2018-07-30
JP2019507412A (ja) 2019-03-14
US20170195348A1 (en) 2017-07-06
KR20180099683A (ko) 2018-09-05
CN108476138A (zh) 2018-08-31
WO2017115356A1 (en) 2017-07-06
IL253178A0 (he) 2017-07-31

Similar Documents

Publication Publication Date Title
HK1257825A1 (zh) 檢測網絡內的位置
IL253178A0 (he) ניתור תעבורה ברשת מחשבים
HK1248038A1 (zh) 通信網絡中的參考信號
HK1225900A1 (zh) 無線網絡中特定於應用的擁塞控制
GB201605194D0 (en) Energy management in a network
GB2525134B (en) Quantized congestion notification in a virtual networking system
ZA201902904B (en) Enabling multiple numerologies in a network
EP3183904A4 (en) Optimizing network traffic management in a mobile network
HUE043236T2 (hu) Hálózatkezelés
SG11201707454QA (en) Network management
EP3289725A4 (en) Device pairing in a local network
GB2531677B (en) A network security system
PL3478013T3 (pl) Kontroler zasobów do zarządzania zasobami w sieci telekomunikacyjnej
GB2535819B (en) Monitoring network conditions
GB201522546D0 (en) Power management in a power over data network
IL263111B (he) רישום תנועה ברשת מחשבים
GB201306186D0 (en) Network monitoring
HK1207221A1 (en) Node de-duplication in a network monitoring system
GB2532032B (en) Congestion monitoring
HK1222281A1 (zh) 網絡管理
PL3035721T3 (pl) Współdzielenie zasobów między urządzeniami w sieci bezprzewodowej
GB2526289B (en) Resource management in a cellular network
EP3155762A4 (en) Multi-peer routing in a network
GB201512306D0 (en) Preventing browser-originating attacks in a local area network
GB201322903D0 (en) A network intersection

Legal Events

Date Code Title Description
FF Patent granted
KB Patent renewed